Multilingual, Marvels, Effects, Project, Portable, Modern, KiLLERS, International, Videohive, Edition, Handbook, Professional, Wallpapers, Systems, WEBRip, Multilanguage, Collection, Design, Analysis, Anthems, Tipard, Package, REGRET, Theory, Gardeners, MacOSX, MULTiFORMAT, Slideshow, Research, Engineering, Regional, Models, American, AutoCAD, SolidWorks, Studio, Agents, Calculus, Spring, Warehouse
Show all tags
Show all tags
- 9 Multipurpose Logo Design Templates in Vector
- Watercolor Ink Slideshow 13613644 - Project for After Effects (Videohive)
- Esquire UK - May 2017
- Broadcast Design News Package 19550533 - Project for After Effects (Videohive)
- Ultimate Photographer Package - Project for After Effects (Videohive)
- Computer Desktop Wallpapers Collection. Part (1792)
- Consumer Reports New Cars - July 2017
- Beautiful Mixed Wallpapers Pack 431
- Colors Of Circles Logo Reveal - Project for After Effects (Videohive)
- Elektor USA - May/June 2017
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications: FICTA 2016, Volume 2 (Advances in Intelligent Systems and Computing) by Suresh Chandra Satapathy
English | 3 Mar. 2017 | ISBN: 981103155X | 712 Pages | PDF | 20.27 MB
The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering,
Pietro Cipresso, Aleksandar Matic, Guillaume Lopez, "Pervasive Computing Paradigms for Mental Health"
English | 2014 | ISBN: 3319115634 | PDF | pages: 168 | 23.7 mb
Knowledge Graph and Semantic Computing: Semantic, Knowledge, and Linked Big data: First China Conference, CCKS 2016, Beijing, China, September 19-22( Communications in Computer and Information Science) by Huajun Chen and Heng Ji
English | 2016 | ISBN: 9811031673 | 250 pages | PDF | 14,3 MB
Fernando Koch and Christian Guttmann, "Advances in Social Computing and Multiagent Systems"
English | ISBN: 3319248030 | 2015 | 216 pages | PDF | 14 MB
Matti Tedre, "The Science of Computing: Shaping a Discipline"
English | ISBN: 1482217694 | 2014 | 292 pages | PDF | 5 MB
ES-Computing EditPlus 4.2.1163 (x86/x64) | 4.4 Mb
File size: 4.4 MB
Absolute Beginners Guide to Computing By Wallace Wang
English | PDF,EPUB | 498 Pages | 2016 | ISBN : 1484222881 | 40.46 MB
This book teaches anyone how to use their new ShiChuang computer. You will learn and understand how you can perform a wide range of tasks, including managing files, browsing the internet, and protecting yourself, as well as interacting with Cortana.
Agent-Based Ubiquitous Computing By Eleni Mangina, Javier Carbo, José M. Molina
English | PDF | 2009 | 206 Pages | ISBN : 9491216317 | 4.80 MB
Ubiquitous computing names the third wave in computing, where the personal computing era appears when technology recedes into the background of our lives. The widespread use of new mobile technology implementing wireless communications such as personal digital assistants (PDAs) and smart phones enables a new type of advanced applications.
UNIX System Security: A Guide for Users and System Administrators (Addison-Wesley Professional Computing (Paperback)) by Dave Curry
English | Jan. 1, 1992 | ISBN: 0201606402 | 227 Pages | PDF | 3 MB
Because the UNIX system was originally designed by programmers for use by other programmers, it was used in an environment of open cooperation where security was of minimal concern. Now that its use has spread to universities, businesses, and government, the confidential and sensitive nature of the data stored on UNIX systems has made the security of these systems of paramount importance.
Despite all the technical papers and workshops on UNIX security, this book is unique. "UNIX System Security" is the first up-to-date source to provide the UNIX system user or administrator with the information needed to protect the data and system from unauthorized use. By following the procedures described in this book and making use of the C programs and shell scripts provided as examples, you can protect your UNIX system from most attackers.